Ubuntu OpenVPN
Setup

Disclaimer: Installation and use of any software made by third party developers is at your own discretion and liability. We share our best practices with third party software but do not provide customer support for them.

Click the Unity menu icon

Search for "terminal"

Launch the Terminal application

On some distributions, you may need to run the following command before running the install script:
sudo apt-get install curl network-manager-openvpn-gnome

Enter the following command in the terminal window:wget https://www.privateinternetaccess.com/installer/pia-nm.sh

tip: Press Ctrl+Shift+V to paste into the terminal.

Enter the second and last command:sudo bash pia-nm.sh

If you are prompted for your password, simply enter the password you use when you log into your computer. No stars or any character will appear: this is normal and just a security feature of the Terminal.

The installer will ask you for your username as well as your connection method.Simply enter your username as indicated. The next two questions are optional and you can simply press the Enter key to skip them and use the defaults.

That's it! You can now connect to PIA using the VPN Connections menu of the networking (arrows or WiFi icon) menu.

EASY Setup Guides for Alternate Configurations (Advanced):

PPTP/L2TP/SOCKS Security

The PPTP/L2TP/SOCKS5 protocols are provided for devices lacking compatibility with the Private Internet Access application or OpenVPN protocol. PPTP/L2TP/SOCKS5 should be used for masking one's IP address, censorship circumvention, and geolocation.

If you need encryption, please use the Private Internet Application or OpenVPN protocol with our service.

After enabling port forwarding and re-connecting to one of the above gateways, please hover your mouse over the System Tray or Menu Bar icon to reveal the tooltip which will display the port number. You can then enter this port into your software.

IPv6 leak protection disables IPv6 traffic while on the VPN. This ensures that no IPv6 traffic leaks out over your normal internet connection when you are connected to the VPN. This includes 6to4 and Teredo tunneled IPv6 traffic.

The dns leak protection feature activates VPN dns leak protection. This ensures that DNS requests are routed through the VPN. This enables the greatest level of privacy and security but may cause connectivity issues in non-standard network configurations.

This can be enabled and disabled in the Windows application, while it is enabled by default on our macOS application.

We use our own private DNS servers for your DNS queries while on the VPN. After connecting we set your operating system's DNS servers to 209.222.18.222 and 209.222.18.218. When using a DNS Leak testing site you should expect to see your DNS requests originate from the IP of the VPN gateway you are connected to.

If you change your DNS servers manually or if for some other reason they are changed this does not necessarily mean your DNS is leaking. Even if you use different DNS servers the queries will still be routed through the VPN connection and will be anonymous.

The internet kill switch activates VPN disconnect protection. If you disconnect from the VPN, your internet access will stop working. It will reactivate normal internet access when you deactivate the kill switch mode or exit the application.

Users who may be connected to two connections simultaneously (ex.: wired and wireless) should not use this feature, as it will only stop 1 active connection type.

Private Internet Access is the leading VPN Service provider specializing in secure, encrypted VPN tunnels which create several layers of privacy and security providing you safety on the internet. Our service is backed by multiple gateways worldwide with access in 32+ countries, 52+ regions.